Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Candidate obfuscation via oblivious LWE sampling

H Wee, D Wichs - Annual International Conference on the Theory and …, 2021 - Springer
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …

A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Indistinguishability obfuscation from circular security

R Gay, R Pass - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …

Candidate witness encryption from lattice techniques

R Tsabary - Annual International Cryptology Conference, 2022 - Springer
Witness encryption (WE), first introduced by Garg, Gentry, Sahai and Waters in, is an
encryption scheme where messages are encrypted with respect to instances of an NP …

Witness encryption and null-IO from evasive LWE

V Vaikuntanathan, H Wee, D Wichs - … on the Theory and Application of …, 2022 - Springer
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to
encrypt a message, and the witness w serves as a decryption key. Security ensures that …

Factoring and pairings are not necessary for io: Circular-secure lwe suffices

Z Brakerski, N Döttling, S Garg… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
We construct indistinguishability obfuscation (iO) solely under circular-security properties of
encryption schemes based on the Learning with Errors (LWE) problem. Circular-security …

Optimal broadcast encryption and CP-ABE from evasive lattice assumptions

H Wee - Annual International Conference on the Theory and …, 2022 - Springer
We present a new, simple candidate broadcast encryption scheme for N users with
parameter size poly (log N). We prove security of our scheme under a non-standard variant …

Optimal broadcast encryption from pairings and LWE

S Agrawal, S Yamada - Advances in Cryptology–EUROCRYPT 2020: 39th …, 2020 - Springer
Abstract Boneh, Waters and Zhandry (CRYPTO 2014) used multilinear maps to provide a
solution to the long-standing problem of public-key broadcast encryption (BE) where all …

Candidate iO from homomorphic encryption schemes

Z Brakerski, N Döttling, S Garg, G Malavolta - Journal of Cryptology, 2023 - Springer
We propose a new approach to construct general-purpose indistinguishability obfuscation
(iO). Our construction is obtained via a new intermediate primitive that we call split fully …